FKIE_CVE-2026-8110
Vulnerability from fkie_nvd - Published: 2026-05-12 15:16 - Updated: 2026-05-12 19:18
Severity ?
Summary
Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ivanti | endpoint_manager | * | |
| ivanti | endpoint_manager | 2024 | |
| ivanti | endpoint_manager | 2024 | |
| ivanti | endpoint_manager | 2024 | |
| ivanti | endpoint_manager | 2024 | |
| ivanti | endpoint_manager | 2024 | |
| ivanti | endpoint_manager | 2024 | |
| ivanti | endpoint_manager | 2024 | |
| ivanti | endpoint_manager | 2024 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "372561DA-DEAF-47DA-99B3-8BBBDADFD91A",
"versionEndIncluding": "2022",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*",
"matchCriteriaId": "6C7283FE-C10A-4E37-B004-15FB0CAC49A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:su1:*:*:*:*:*:*",
"matchCriteriaId": "FC51EEA2-1C4C-4069-9704-7ACFE4773930",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:su2:*:*:*:*:*:*",
"matchCriteriaId": "E1EF5E1B-9377-49D3-9BE3-62FC78E666A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:su3:*:*:*:*:*:*",
"matchCriteriaId": "749AADDA-834D-4EC0-B7FF-E136FD1984F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:su3_security_release_1:*:*:*:*:*:*",
"matchCriteriaId": "698BF7A1-62A1-45B5-BF08-AB3F3AA0245C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:su4:*:*:*:*:*:*",
"matchCriteriaId": "4902A745-E7CB-4FC9-9BCB-89EFAB643237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:su4_security_release_1:*:*:*:*:*:*",
"matchCriteriaId": "9DF8F788-0384-4E6B-844E-35ED79CA1F17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:endpoint_manager:2024:su5:*:*:*:*:*:*",
"matchCriteriaId": "BABFF9B3-92CE-4086-BE93-9A884F1210D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect permissions assignment in\u00a0the agent of\u00a0Ivanti Endpoint Manager before\u00a0version 2024\u00a0SU6\u00a0allows a\u00a0local\u00a0authenticated\u00a0attacker to\u00a0escalate their privileges."
}
],
"id": "CVE-2026-8110",
"lastModified": "2026-05-12T19:18:08.873",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary"
}
]
},
"published": "2026-05-12T15:16:17.770",
"references": [
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
],
"url": "https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-EPM-May-2026?language=en_US"
}
],
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Primary"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…